default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn57.bht:"
@article{DBLP:journals/cn/0004DZMF013, author = {Yi Wang and Huichen Dai and Ting Zhang and Wei Meng and Jindou Fan and Bin Liu}, title = {GPU-accelerated name lookup with component encoding}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3165--3177}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.006}, doi = {10.1016/J.COMNET.2013.07.006}, timestamp = {Mon, 28 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/0004DZMF013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AcarBK13, author = {Tolga Acar and Mira Belenkiy and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Single password authentication}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2597--2614}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.007}, doi = {10.1016/J.COMNET.2013.05.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AcarBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AccongiagiocoAMS13, author = {Giovanni Accongiagioco and Matteo Maria Andreozzi and Daniele Migliorini and Giovanni Stea}, title = {Throughput-optimal resource allocation in LTE-Advanced with distributed antennas}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3997--4009}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.10.002}, doi = {10.1016/J.COMNET.2013.10.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AccongiagiocoAMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AcetoBDP13, author = {Giuseppe Aceto and Alessio Botta and Walter de Donato and Antonio Pescap{\`{e}}}, title = {Cloud monitoring: {A} survey}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2093--2115}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.001}, doi = {10.1016/J.COMNET.2013.04.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AcetoBDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ahmed13, author = {Adel Ali Ahmed}, title = {An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1459--1473}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.003}, doi = {10.1016/J.COMNET.2013.02.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ahmed13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Akkari13, author = {Nadine Akkari}, title = {An IMS-based integration architecture for WiMax/LTE handover}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3790--3798}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.005}, doi = {10.1016/J.COMNET.2013.09.005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Akkari13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AkyildizR13, author = {Ian F. Akyildiz and Harry Rudin}, title = {{COMNET} editorial for 2012}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.014}, doi = {10.1016/J.COMNET.2012.12.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AkyildizR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Al-ArnaoutFF13, author = {Zakwan Al{-}Arnaout and Qiang Fu and Marcus Frean}, title = {A divide-and-conquer approach for content replication in WMNs}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3914--3928}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.016}, doi = {10.1016/J.COMNET.2013.09.016}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Al-ArnaoutFF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AleksicDVJPM13, author = {Slavisa Aleksic and Margot Deruyck and Willem Vereecken and Wout Joseph and Mario Pickavet and Luc Martens}, title = {Energy efficiency of femtocell deployment in combined wireless/optical access networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1217--1233}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.013}, doi = {10.1016/J.COMNET.2012.12.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AleksicDVJPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlmasizadehA13, author = {Jaafar Almasizadeh and Mohammad Abdollahi Azgomi}, title = {A stochastic model of attack process for the evaluation of security metrics}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2159--2180}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.011}, doi = {10.1016/J.COMNET.2013.03.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AlmasizadehA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlsalihAH13, author = {Waleed Alsalih and Kashif Ali and Hossam S. Hassanein}, title = {A power control technique for anti-collision schemes in {RFID} systems}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1991--2003}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.016}, doi = {10.1016/J.COMNET.2013.03.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AlsalihAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AmadeoCM13, author = {Marica Amadeo and Claudia Campolo and Antonella Molinaro}, title = {Enhancing content-centric networking for vehicular environments}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3222--3234}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.005}, doi = {10.1016/J.COMNET.2013.07.005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AmadeoCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AmadorA13, author = {Julia Amador and Jesus R. Artalejo}, title = {Modeling computer virus with the {BSDE} approach}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {302--316}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.014}, doi = {10.1016/J.COMNET.2012.09.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AmadorA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AmaldiCG13, author = {Edoardo Amaldi and Antonio Capone and Luca Giovanni Gianoli}, title = {Energy-aware {IP} traffic engineering with shortest path routing}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1503--1517}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.006}, doi = {10.1016/J.COMNET.2013.02.006}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AmaldiCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ammari13, author = {Habib M. Ammari}, title = {On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: {A} multi-objective optimization problem}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1913--1935}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.009}, doi = {10.1016/J.COMNET.2013.03.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ammari13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AnWYY13, author = {Donghyeok An and Honguk Woo and Hyunsoo Yoon and Ikjun Yeom}, title = {Enhanced cooperative communication {MAC} for mobile wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {99--116}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.001}, doi = {10.1016/J.COMNET.2012.09.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AnWYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AnadiotisPV13, author = {Angelos{-}Christos G. Anadiotis and Charalampos Z. Patrikakis and Iakovos S. Venieris}, title = {On the performance improvement of gossip protocols for content-based publish-subscribe through caching}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3759--3772}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.030}, doi = {10.1016/J.COMNET.2013.08.030}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AnadiotisPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AnagnostopoulosH13, author = {Christos Anagnostopoulos and Stathes Hadjiefthymiades}, title = {Multivariate context collection in mobile sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1394--1407}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.01.001}, doi = {10.1016/J.COMNET.2013.01.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AnagnostopoulosH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Angrishi13, author = {Kishore Angrishi}, title = {An end-to-end stochastic network calculus with effective bandwidth and effective capacity}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {78--84}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.003}, doi = {10.1016/J.COMNET.2012.09.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Angrishi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AntoniouPBEM13, author = {Pavlos Antoniou and Andreas Pitsillides and Tim Blackwell and Andries P. Engelbrecht and Loizos Michael}, title = {Congestion control in wireless sensor networks based on bird flocking behavior}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1167--1191}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.008}, doi = {10.1016/J.COMNET.2012.12.008}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AntoniouPBEM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ApelRTK13, author = {Sven Apel and Alexander von Rhein and Thomas Th{\"{u}}m and Christian K{\"{a}}stner}, title = {Feature-interaction detection based on feature-based specifications}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2399--2409}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.025}, doi = {10.1016/J.COMNET.2013.02.025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ApelRTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ArkoulisAKPM13, author = {Stamatios Arkoulis and Evangelos Anifantis and Vasileios Karyotis and Symeon Papavassiliou and Nikolas Mitrou}, title = {On the optimal, fair and channel-aware cognitive radio network reconfiguration}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1739--1757}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.004}, doi = {10.1016/J.COMNET.2013.03.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ArkoulisAKPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AtsanO13, author = {Emre Atsan and {\"{O}}znur {\"{O}}zkasap}, title = {{SCALAR:} Scalable data lookup and replication protocol for mobile ad hoc networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3654--3672}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.012}, doi = {10.1016/J.COMNET.2013.08.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AtsanO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AvrachenkovADJ13, author = {Konstantin Avrachenkov and Urtzi Ayesta and Josu Doncel and Peter Jacko}, title = {Congestion control of {TCP} flows in Internet routers by means of index policy}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3463--3478}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.001}, doi = {10.1016/J.COMNET.2013.08.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AvrachenkovADJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AzouziPSK13, author = {Rachid El Azouzi and Francesco De Pellegrini and Habib B. A. Sidi and Vijay Kamble}, title = {Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {1003--1018}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.014}, doi = {10.1016/J.COMNET.2012.11.014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AzouziPSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BabarcziBOTS13, author = {P{\'{e}}ter Babarczi and Gergely Bicz{\'{o}}k and Harald {\O}verby and J{\'{a}}nos Tapolcai and P{\'{e}}ter Soproni}, title = {Realization strategies of dedicated path protection: {A} bandwidth cost perspective}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1974--1990}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.015}, doi = {10.1016/J.COMNET.2013.03.015}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BabarcziBOTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BacciL13, author = {Giacomo Bacci and Marco Luise}, title = {QoS-aware game-theoretic rate {\&} power control for {CDMA} wireless communication networks}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1789--1804}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.007}, doi = {10.1016/J.COMNET.2013.03.007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BacciL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaekLS13, author = {Joo{-}Young Baek and Jeong{-}Yoon Lee and Young{-}Joo Suh}, title = {An elastic compensation model for frame-based scheduling algorithms in wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {725--740}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.017}, doi = {10.1016/J.COMNET.2012.10.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BaekLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BandaraJ13, author = {H. M. N. Dilum Bandara and Anura P. Jayasumana}, title = {Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3235--3248}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.033}, doi = {10.1016/J.COMNET.2013.07.033}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BandaraJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaralisBCCM13, author = {Elena Baralis and Andrea Bianco and Tania Cerquitelli and Luca Chiaraviglio and Marco Mellia}, title = {NetCluster: {A} clustering-based framework to analyze internet passive measurements data}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3300--3315}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.019}, doi = {10.1016/J.COMNET.2013.07.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BaralisBCCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BarkoosaraeiA13, author = {A. Mirsayar Barkoosaraei and A. Hamid Aghvami}, title = {Dynamic partitioning of IP-based wireless access networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {134--146}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.005}, doi = {10.1016/J.COMNET.2012.09.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BarkoosaraeiA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bauer13, author = {Christian Bauer}, title = {A Secure Correspondent Router Protocol for {NEMO} Route Optimization}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1078--1100}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.021}, doi = {10.1016/J.COMNET.2012.10.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Bauer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BazianaP13, author = {Peristera A. Baziana and Ioannis E. Pountourakis}, title = {An access protocol for efficiency optimization in {WDM} networks: {A} propagation delay and collisions avoidance analysis}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1234--1252}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.015}, doi = {10.1016/J.COMNET.2012.12.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BazianaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BellaltaFSBVO13, author = {Boris Bellalta and Azadeh Faridi and Dirk Staehle and Jaume Barcel{\'{o}} and Alexey V. Vinel and Miquel Oliver}, title = {Performance analysis of {CSMA/CA} protocols with multi-packet transmission}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2675--2688}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.009}, doi = {10.1016/J.COMNET.2013.05.009}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BellaltaFSBVO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Ben-PoratBL13, author = {Udi Ben{-}Porat and Anat Bremler{-}Barr and Hanoch Levy}, title = {On the exploitation of {CDF} based wireless scheduling}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2193--2205}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.022}, doi = {10.1016/J.COMNET.2012.11.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Ben-PoratBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BenfattoumMA13, author = {Youghourta Benfattoum and Steven Martin and Khaldoun Al Agha}, title = {QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1488--1502}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.005}, doi = {10.1016/J.COMNET.2013.02.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BenfattoumMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoiardiCS13, author = {Silvia Boiardi and Antonio Capone and Brunilde Sans{\`{o}}}, title = {Radio planning of energy-aware cellular networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2564--2577}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.003}, doi = {10.1016/J.COMNET.2013.05.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BoiardiCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoleaPA13, author = {Liliana Bolea and Jordi P{\'{e}}rez{-}Romero and Ram{\'{o}}n Agust{\'{\i}}}, title = {{ML} aided context feature extraction for cognitive radio}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3713--3727}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.016}, doi = {10.1016/J.COMNET.2013.08.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BoleaPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BorgiaAC13, author = {Eleonora Borgia and Giuseppe Anastasi and Marco Conti}, title = {Energy efficient and reliable data delivery in urban sensing applications: {A} performance analysis}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3389--3409}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.025}, doi = {10.1016/J.COMNET.2013.07.025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BorgiaAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Borraz-SanchezK13, author = {Conrado Borraz{-}S{\'{a}}nchez and Diego Klabjan}, title = {Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1443--1458}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.002}, doi = {10.1016/J.COMNET.2013.02.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Borraz-SanchezK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoshmafMBR13, author = {Yazan Boshmaf and Ildar Muslukhov and Konstantin Beznosov and Matei Ripeanu}, title = {Design and analysis of a social botnet}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {556--578}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.006}, doi = {10.1016/J.COMNET.2012.06.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BoshmafMBR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoteroH13, author = {Juan Felipe Botero and Xavier Hesselbach}, title = {Greener networking in a network virtualization environment}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2021--2039}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.004}, doi = {10.1016/J.COMNET.2013.04.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BoteroH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Bou-HarbDA13, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {A systematic approach for detecting and clustering distributed cyber scanning}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3826--3839}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.008}, doi = {10.1016/J.COMNET.2013.09.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Bou-HarbDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoualiSPA13, author = {Faouzi Bouali and Oriol Sallent and Jordi P{\'{e}}rez{-}Romero and Ram{\'{o}}n Agust{\'{\i}}}, title = {A cognitive management framework for spectrum selection}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2752--2765}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.008}, doi = {10.1016/J.COMNET.2013.06.008}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BoualiSPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaballeroS13, author = {Juan Caballero and Dawn Song}, title = {Automatic protocol reverse-engineering: Message format extraction and field semantics inference}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {451--474}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.003}, doi = {10.1016/J.COMNET.2012.08.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaballeroS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaiPWKM13, author = {Yifeng Cai and Konstantinos Pelechrinis and Xin Wang and Prashant Krishnamurthy and Yijun Mo}, title = {Joint reactive jammer detection and localization in an enterprise WiFi network}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3799--3811}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.004}, doi = {10.1016/J.COMNET.2013.09.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaiPWKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CamachoGBV13, author = {Jos{\'{e}} M. Camacho and Alberto Garc{\'{\i}}a{-}Mart{\'{\i}}nez and Marcelo Bagnulo and Francisco Valera}, title = {{BGP-XM:} {BGP} eXtended Multipath for transit Autonomous Systems}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {954--975}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.011}, doi = {10.1016/J.COMNET.2012.11.011}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CamachoGBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CamachoPGD13, author = {Jos{\'{e}} Camacho and Pablo Padilla and Pedro Garc{\'{\i}}a{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, title = {A generalizable dynamic flow pairing method for traffic classification}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2718--2732}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.006}, doi = {10.1016/J.COMNET.2013.06.006}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CamachoPGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Canberk13, author = {Berk Canberk}, title = {An adaptive and QoS-based spectrum awareness framework for {CR} networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {364--373}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.020}, doi = {10.1016/J.COMNET.2012.09.020}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Canberk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CappaneraLLSV13, author = {Paola Cappanera and Luciano Lenzini and Alessandro Lori and Giovanni Stea and Gigliola Vaglini}, title = {Optimal joint routing and link scheduling for real-time traffic in {TDMA} Wireless Mesh Networks}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2301--2312}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.021}, doi = {10.1016/J.COMNET.2012.11.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CappaneraLLSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarofiglioGM13, author = {Giovanna Carofiglio and Massimo Gallo and Luca Muscariello}, title = {On the performance of bandwidth and storage sharing in information-centric networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3743--3758}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.018}, doi = {10.1016/J.COMNET.2013.08.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarofiglioGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarofiglioMMSV13, author = {Giovanna Carofiglio and Giacomo Morabito and Luca Muscariello and Ignacio Solis and Matteo Varvello}, title = {From content delivery today to information centric networking}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3116--3127}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.002}, doi = {10.1016/J.COMNET.2013.07.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarofiglioMMSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarofiglioMRTV13, author = {Giovanna Carofiglio and Luca Muscariello and Dario Rossi and Claudio Testa and Silvio Valenti}, title = {Rethinking the Low Extra Delay Background Transport {(LEDBAT)} Protocol}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1838--1852}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.020}, doi = {10.1016/J.COMNET.2013.02.020}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarofiglioMRTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarranoPMA13, author = {Ricardo Campanha Carrano and Diego G. Passos and Luiz Claudio Schara Magalh{\~{a}}es and C{\'{e}}lio Vinicius N. de Albuquerque}, title = {Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3316--3326}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.020}, doi = {10.1016/J.COMNET.2013.07.020}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CarranoPMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarvalhoWACC13, author = {Glaucio H. S. Carvalho and Isaac Woungang and Alagan Anpalagan and Rodolfo W. L. Coutinho and Jo{\~{a}}o Cris{\'{o}}stomo Weyl Albuquerque Costa}, title = {A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3545--3562}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.029}, doi = {10.1016/J.COMNET.2013.07.029}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarvalhoWACC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CasagrandeMB13, author = {Daniele Casagrande and Pier Luca Montessoro and Franco Blanchini}, title = {Fair and optimal dynamic admission control of elastic flows}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1277--1288}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.010}, doi = {10.1016/J.COMNET.2012.12.010}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CasagrandeMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CasalicchioS13, author = {Emiliano Casalicchio and Luca Silvestri}, title = {Mechanisms for {SLA} provisioning in cloud-based service providers}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {795--810}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.020}, doi = {10.1016/J.COMNET.2012.10.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CasalicchioS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaskurluGBS13, author = {Bugra {\c{C}}askurlu and Ashish Gehani and Cemal {\c{C}}agatay Bilgin and K. Subramani}, title = {Analytical models for risk-based intrusion response}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2181--2192}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.012}, doi = {10.1016/J.COMNET.2013.03.012}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaskurluGBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChangCWL13, author = {Chao{-}Tsun Chang and Chih{-}Yung Chang and Tzu{-}Lin Wang and Yun{-}Jung Lu}, title = {Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2483--2498}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.018}, doi = {10.1016/J.COMNET.2013.03.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChangCWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChangLL13, author = {Ben{-}Jye Chang and Ying{-}Hsin Liang and Yu{-}Hsien Lee}, title = {Dynamic-cost-reward connection admission control for maximizing system reward in 4G wireless multihop relaying networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2643--2655}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.002}, doi = {10.1016/J.COMNET.2013.06.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenLWVSZM13, author = {Xiuzhong Chen and Marc De Leenheer and Rui Wang and Chaitanya S. K. Vadrevu and Lei Shi and Jie Zhang and Biswanath Mukherjee}, title = {High-performance routing for hose-based VPNs in multi-domain backbone networks}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {944--953}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.010}, doi = {10.1016/J.COMNET.2012.11.010}, timestamp = {Wed, 09 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChenLWVSZM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenP13, author = {Baozhi Chen and Dario Pompili}, title = {Minimizing position uncertainty for under-ice autonomous underwater vehicles}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3840--3854}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.009}, doi = {10.1016/J.COMNET.2013.09.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenRDK13, author = {Yuh{-}Rong Chen and Sridhar Radhakrishnan and Sudarshan K. Dhall and Suleyman Karabuk}, title = {On multi-stream multi-source multicast routing}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2916--2930}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.012}, doi = {10.1016/J.COMNET.2013.05.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenRDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenXV13, author = {Hui Chen and Yang Xiao and Susan V. Vrbsky}, title = {An update-based step-wise optimal cache replacement for wireless data access}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {197--212}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.012}, doi = {10.1016/J.COMNET.2012.09.012}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenXV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenXYLC13, author = {Xiaohui Chen and Jing Xu and Wei Yuan and Wei Liu and Wenqing Cheng}, title = {Channel assignment in heterogeneous multi-radio multi-channel wireless networks: {A} game theoretic approach}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3291--3299}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.017}, doi = {10.1016/J.COMNET.2013.07.017}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChenXYLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenY13, author = {Lei Chen and Di Yuan}, title = {Mathematical modeling for optimal design of in-building distributed antenna systems}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3428--3445}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.027}, doi = {10.1016/J.COMNET.2013.07.027}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiJZWL13, author = {Kaikai Chi and Xiaohong Jiang and Yi{-}hua Zhu and Jing Wang and Yanjun Li}, title = {Block-level packet recovery with network coding for wireless reliable multicast}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {910--923}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.008}, doi = {10.1016/J.COMNET.2012.11.008}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChiJZWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiappettaMPR13, author = {S. Chiappetta and Claudio Mazzariello and Roberta Presta and Simon Pietro Romano}, title = {An anomaly-based approach to the analysis of the social behavior of VoIP users}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1545--1559}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.009}, doi = {10.1016/J.COMNET.2013.02.009}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChiappettaMPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiaraviglioCMM13, author = {Luca Chiaraviglio and Delia Ciullo and Marco Mellia and Michela Meo}, title = {Modeling sleep mode gains in energy-aware networks}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3051--3066}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.011}, doi = {10.1016/J.COMNET.2013.07.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChiaraviglioCMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiaraviglioCRP13, author = {Luca Chiaraviglio and Antonio Cianfrani and Esther Le Rouzic and Marco Polverini}, title = {Sleep modes effectiveness in backbone networks with limited configurations}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2931--2948}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.016}, doi = {10.1016/J.COMNET.2013.06.016}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChiaraviglioCRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Chien13, author = {Hung{-}Yu Chien}, title = {Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2705--2717}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.005}, doi = {10.1016/J.COMNET.2013.06.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Chien13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChuGCG13, author = {Weibo Chu and Xiaohong Guan and Zhongmin Cai and Lixin Gao}, title = {Real-time volume control for interactive network traffic replay}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1611--1629}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.012}, doi = {10.1016/J.COMNET.2013.02.012}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChuGCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChuGKWJ13, author = {Zi Chu and Steven Gianvecchio and Aaron Koehl and Haining Wang and Sushil Jajodia}, title = {Blog or block: Detecting blog bots through behavioral biometrics}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {634--646}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.005}, doi = {10.1016/J.COMNET.2012.10.005}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChuGKWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CoiroLVM13, author = {Angelo Coiro and Marco Listanti and Alessandro Valenti and Francesco Matera}, title = {Energy-aware traffic engineering: {A} routing-based distributed solution for connection-oriented {IP} networks}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2004--2020}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.017}, doi = {10.1016/J.COMNET.2013.03.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CoiroLVM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ColucciaDR13, author = {Angelo Coluccia and Alessandro D'Alconzo and Fabio Ricciato}, title = {Distribution-based anomaly detection via generalized likelihood ratio test: {A} general Maximum Entropy approach}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3446--3462}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.028}, doi = {10.1016/J.COMNET.2013.07.028}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ColucciaDR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ContiGT13, author = {Mauro Conti and Paolo Gasti and Marco Teoli}, title = {A lightweight mechanism for detection of cache pollution attacks in Named Data Networking}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3178--3191}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.034}, doi = {10.1016/J.COMNET.2013.07.034}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ContiGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CordeschiSB13, author = {Nicola Cordeschi and Mohammad Shojafar and Enzo Baccarelli}, title = {Energy-saving self-configuring networked data centers}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3479--3491}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.002}, doi = {10.1016/J.COMNET.2013.08.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CordeschiSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CsernaiGKSB13, author = {M{\'{a}}rton Csernai and Andr{\'{a}}s Guly{\'{a}}s and Attila Kor{\"{o}}si and Bal{\'{a}}zs Sonkoly and Gergely Bicz{\'{o}}k}, title = {Incrementally upgradable data center architecture using hyperbolic tessellations}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1373--1393}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.004}, doi = {10.1016/J.COMNET.2012.12.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CsernaiGKSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CuiJ13, author = {Lin Cui and Weijia Jia}, title = {Cyclic stable matching for three-sided networking services}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {351--363}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.021}, doi = {10.1016/J.COMNET.2012.09.021}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CuiJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CzirkosH13, author = {Zolt{\'{a}}n Czirkos and G{\'{a}}bor Hossz{\'{u}}}, title = {Solution for the broadcasting in the Kademlia peer-to-peer overlay}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1853--1862}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.021}, doi = {10.1016/J.COMNET.2013.02.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CzirkosH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DAcuntoCVS13, author = {Lucia D'Acunto and Nitin Chiluka and Tam{\'{a}}s Vink{\'{o}} and Henk J. Sips}, title = {BitTorrent-like {P2P} approaches for VoD: {A} comparative study}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1253--1276}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.016}, doi = {10.1016/J.COMNET.2012.12.016}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DAcuntoCVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DetalPLMAB13, author = {Gregory Detal and Christoph Paasch and Simon van der Linden and Pascal M{\'{e}}rindol and Gildas Avoine and Olivier Bonaventure}, title = {Revisiting flow-based load balancing: Stateless path selection in data center networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1204--1216}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.011}, doi = {10.1016/J.COMNET.2012.12.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DetalPLMAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DettiPGC13, author = {Andrea Detti and Diego Perino and Mario Gerla and Yanghee Choi}, title = {Editorial: Special issue on Information Centric Networking}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3113--3115}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.012}, doi = {10.1016/J.COMNET.2013.09.012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DettiPGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DialloSFFT13, author = {Mohamed Diallo and Vasilis Sourlas and Paris Flegkas and Serge Fdida and Leandros Tassiulas}, title = {A content-based publish/subscribe framework for large-scale content delivery}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {924--943}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.009}, doi = {10.1016/J.COMNET.2012.11.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/DialloSFFT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DiarrassoubaLMY13, author = {Ibrahima Diarrassouba and Ali Lourimi and Ali Ridha Mahjoub and Habib Youssef}, title = {Hose workload based exact algorithm for the optimal design of virtual private networks}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2766--2774}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.009}, doi = {10.1016/J.COMNET.2013.06.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DiarrassoubaLMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DietrichRP13, author = {Christian J. Dietrich and Christian Rossow and Norbert Pohlmann}, title = {CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {475--486}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.019}, doi = {10.1016/J.COMNET.2012.06.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DietrichRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DonmezIE13, author = {Mehmet Yunus Donmez and Sinan Isik and Cem Ersoy}, title = {Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1101--1112}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.016}, doi = {10.1016/J.COMNET.2012.11.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DonmezIE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DumitrasN13, author = {Tudor Dumitras and Priya Narasimhan}, title = {A study of unpredictability in fault-tolerant middleware}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {682--698}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.015}, doi = {10.1016/J.COMNET.2012.10.015}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DumitrasN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EidenbenzMS13, author = {Stephan J. Eidenbenz and Madhav V. Marathe and Arunabha Sen}, title = {Editorial for Computer Networks special issue on ''Towards a Science of Cyber Security''}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2119--2120}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.005}, doi = {10.1016/J.COMNET.2013.05.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/EidenbenzMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EsheteJ13, author = {Addisu Eshete and Yuming Jiang}, title = {Generalizing the CHOKe flow protection}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {147--161}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.004}, doi = {10.1016/J.COMNET.2012.09.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/EsheteJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EspositoCR13, author = {Christian Esposito and Domenico Cotroneo and Stefano Russo}, title = {On reliability in publish/subscribe services}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1318--1343}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.023}, doi = {10.1016/J.COMNET.2012.10.023}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/EspositoCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/EumNMSN13, author = {Suyong Eum and Kiyohide Nakauchi and Masayuki Murata and Yozo Shoji and Nozomu Nishinaga}, title = {Potential based routing as a secondary best-effort routing for Information Centric Networking {(ICN)}}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3154--3164}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.010}, doi = {10.1016/J.COMNET.2013.08.010}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/EumNMSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FacchiniHGFA13, author = {Christian Facchini and Oliver Holland and Fabrizio Granelli and Nelson L. S. da Fonseca and Hamid Aghvami}, title = {Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1597--1610}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.011}, doi = {10.1016/J.COMNET.2013.02.011}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FacchiniHGFA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FahadTKHA13, author = {Adil Fahad and Zahir Tari and Ibrahim Khalil and Ibrahim Habib and Hussein M. Alnuweiri}, title = {Toward an efficient and scalable feature selection approach for internet traffic classification}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2040--2057}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.005}, doi = {10.1016/J.COMNET.2013.04.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FahadTKHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FaiglBPG13, author = {Zolt{\'{a}}n Faigl and L{\'{a}}szl{\'{o}} Bokor and Jani Pellikka and Andrei V. Gurtov}, title = {Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3370--3388}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.024}, doi = {10.1016/J.COMNET.2013.07.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FaiglBPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FanLWZT13, author = {Linjun Fan and Yunxiang Ling and Tao Wang and Xiaomin Zhu and Xiaoyong Tang}, title = {Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1474--1487}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.004}, doi = {10.1016/J.COMNET.2013.02.004}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FanLWZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FangLLCX13, author = {Weiwei Fang and Xiangmin Liang and Shengxin Li and Luca Chiaraviglio and Naixue Xiong}, title = {VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {179--196}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.008}, doi = {10.1016/J.COMNET.2012.09.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FangLLCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FangYX13, author = {Xi Fang and Dejun Yang and Guoliang Xue}, title = {Pathbook: Cross-layer optimization for full-duplex wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1895--1912}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.003}, doi = {10.1016/J.COMNET.2013.03.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FangYX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FernandesMD13, author = {Natalia Castro Fernandes and Marcelo Duffles Donato Moreira and Otto Carlos Muniz Bandeira Duarte}, title = {Safeguarding ad hoc networks with a self-organized membership control system}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2656--2674}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.004}, doi = {10.1016/J.COMNET.2013.06.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FernandesMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FicekPK13, author = {Michal Ficek and Tom{\'{a}}s Pop and Lukas Kencl}, title = {Active tracking in mobile networks: An in-depth view}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1936--1954}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.013}, doi = {10.1016/J.COMNET.2013.03.013}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FicekPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FrasMC13, author = {Matjaz Fras and Joze Mohorko and Zarko Cucej}, title = {Limitations of a Mapping Algorithm with Fragmentation Mimics {(MAFM)} when modeling statistical data sources based on measured packet network traffic}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3686--3700}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.032}, doi = {10.1016/J.COMNET.2013.07.032}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FrasMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GasiorD13, author = {Dariusz Gasior and Maciej Drwal}, title = {Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2817--2832}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.012}, doi = {10.1016/J.COMNET.2013.06.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GasiorD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GeravandA13, author = {Shahabeddin Geravand and Mahmood Ahmadi}, title = {Bloom filter applications in network security: {A} state-of-the-art survey}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {4047--4064}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.003}, doi = {10.1016/J.COMNET.2013.09.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GeravandA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GhodsYHM13, author = {Fatemeh Ghods and Hamed Yousefi and Ali Mohammad Afshin Hemmatyar and Ali Movaghar}, title = {{MC-MLAS:} Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3812--3825}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.007}, doi = {10.1016/J.COMNET.2013.09.007}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/GhodsYHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GokturkGE13, author = {M. Sarper Gokturk and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Elza Erkip}, title = {A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {4010--4029}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.10.003}, doi = {10.1016/J.COMNET.2013.10.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GokturkGE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GramatikovJCG13, author = {Sasho Gramatikov and Fernando Jaureguizar and Juli{\'{a}}n Cabrera and Narciso Garc{\'{\i}}a}, title = {Stochastic modelling of peer-assisted VoD streaming in managed networks}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2058--2074}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.006}, doi = {10.1016/J.COMNET.2013.04.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GramatikovJCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GregoriLO13, author = {Enrico Gregori and Luciano Lenzini and Chiara Orsini}, title = {k-Dense communities in the Internet AS-level topology graph}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {213--227}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.011}, doi = {10.1016/J.COMNET.2012.09.011}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GregoriLO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GyarmatiGSTB13, author = {L{\'{a}}szl{\'{o}} Gyarmati and Andr{\'{a}}s Guly{\'{a}}s and Bal{\'{a}}zs Sonkoly and Tuan Anh Trinh and Gergely Bicz{\'{o}}k}, title = {Free-scaling your data center}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1758--1773}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.005}, doi = {10.1016/J.COMNET.2013.03.005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/GyarmatiGSTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HaYKK13, author = {Jihun Ha and Jiung Yu and Byungjo Kim and Hyogon Kim}, title = {On {UDP} continuity over vertical handovers}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3563--3580}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.030}, doi = {10.1016/J.COMNET.2013.07.030}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HaYKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HabakYH13, author = {Karim Habak and Moustafa Youssef and Khaled A. Harras}, title = {An optimal deployable bandwidth aggregation system}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3067--3080}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.012}, doi = {10.1016/J.COMNET.2013.07.012}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HabakYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HagelsteinAFS13, author = {Brett Hagelstein and Mehran Abolhasan and Daniel Robert Franklin and Farzad Safaei}, title = {Improving fairness in {IEEE} 802.11 networks using {MAC} layer opportunistic retransmission}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3410--3427}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.026}, doi = {10.1016/J.COMNET.2013.07.026}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HagelsteinAFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HanJFA13, author = {Chong Han and Josep Miquel Jornet and Etimad A. Fadel and Ian F. Akyildiz}, title = {A cross-layer communication module for the Internet of Things}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {622--633}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.003}, doi = {10.1016/J.COMNET.2012.10.003}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HanJFA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HouHH13, author = {Cuiqin Hou and Yibin Hou and Zhangqin Huang}, title = {A framework based on barycentric coordinates for localization in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3701--3712}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.014}, doi = {10.1016/J.COMNET.2013.08.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HouHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HsiaoCLW13, author = {Yi{-}Mao Hsiao and Yuan{-}Sun Chu and Jeng{-}Farn Lee and Jinn{-}Shyan Wang}, title = {A high-throughput and high-capacity IPv6 routing lookup system}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {782--794}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.001}, doi = {10.1016/J.COMNET.2012.11.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HsiaoCLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Hu0X13, author = {Chao Hu and Ming Chen and Chang{-}you Xing}, title = {Towards efficient video chunk dissemination in peer-to-peer live streaming}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3009--3024}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.003}, doi = {10.1016/J.COMNET.2013.07.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Hu0X13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuaCPC13, author = {Kai{-}Lung Hua and Ge{-}Ming Chiu and Hsing{-}Kuo Pao and Yi{-}Chi Cheng}, title = {An efficient scheduling algorithm for scalable video streaming over {P2P} networks}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2856--2868}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.014}, doi = {10.1016/J.COMNET.2013.06.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HuaCPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuaS13, author = {Jingyu Hua and Kouichi Sakurai}, title = {Botnet command and control based on Short Message Service and human mobility}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {579--597}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.007}, doi = {10.1016/J.COMNET.2012.06.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HuaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Huang13, author = {Chun{-}Ying Huang}, title = {Effective bot host detection based on network failure models}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {514--525}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.018}, doi = {10.1016/J.COMNET.2012.07.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Huang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HunkelerLTW13, author = {Urs Hunkeler and Clemens Lombriser and Hong Linh Truong and Beat Weiss}, title = {A case for centrally controlled wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1425--1442}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.019}, doi = {10.1016/J.COMNET.2012.12.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HunkelerLTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IacovazziDRB13, author = {Alfonso Iacovazzi and Alessandro D'Alconzo and Fabio Ricciato and Martin Burkhart}, title = {Elementary secure-multiparty computation for massive-scale collaborative network monitoring: {A} quantitative assessment}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3728--3742}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.017}, doi = {10.1016/J.COMNET.2013.08.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IacovazziDRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/IellamoCC13, author = {Stefano Iellamo and Lin Chen and Marceau Coupechoux}, title = {Proportional and double imitation rules for spectrum access in cognitive radio networks}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1863--1879}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.008}, doi = {10.1016/J.COMNET.2013.03.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/IellamoCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JamdagniTHNL13, author = {Aruna Jamdagni and Zhiyuan Tan and Xiangjian He and Priyadarsi Nanda and Ren Ping Liu}, title = {RePIDS: {A} multi tier Real-time Payload-based Intrusion Detection System}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {811--824}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.002}, doi = {10.1016/J.COMNET.2012.10.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JamdagniTHNL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JangLS13, author = {Beakcheol Jang and Jun Bum Lim and Mihail L. Sichitiu}, title = {An asynchronous scheduled {MAC} protocol for wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {85--98}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.002}, doi = {10.1016/J.COMNET.2012.09.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JangLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JeongHD13, author = {Jaehoon (Paul) Jeong and Tian He and David H. C. Du}, title = {{TMA:} Trajectory-based Multi-Anycast forwarding for efficient multicast data delivery in vehicular networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2549--2563}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.002}, doi = {10.1016/J.COMNET.2013.05.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JeongHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Julisch13, author = {Klaus Julisch}, title = {Understanding and overcoming cyber security anti-patterns}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2206--2211}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.023}, doi = {10.1016/J.COMNET.2012.11.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Julisch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JungMNEL13, author = {Tobias Jung and Sylvain Martin and Mohamed Nassar and Damien Ernst and Guy Leduc}, title = {Outbound {SPIT} filter with optimal performance guarantees}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1630--1643}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.013}, doi = {10.1016/J.COMNET.2013.02.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JungMNEL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Kamiyama13, author = {Noriaki Kamiyama}, title = {Designing data center network by analytic hierarchy process}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {658--667}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.009}, doi = {10.1016/J.COMNET.2012.10.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Kamiyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KamiyamaKH13, author = {Noriaki Kamiyama and Ryoichi Kawahara and Haruhisa Hasegawa}, title = {Optimum profit allocation in coalitional VoD service}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3081--3097}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.013}, doi = {10.1016/J.COMNET.2013.07.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KamiyamaKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KamiyamaMK13, author = {Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara}, title = {Autonomic load balancing of flow monitors}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {741--761}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.018}, doi = {10.1016/J.COMNET.2012.10.018}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KamiyamaMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KarasabunKA13, author = {Efe Karasabun and Ibrahim Korpeoglu and Cevdet Aykanat}, title = {Active node determination for correlated data gathering in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1124--1138}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.018}, doi = {10.1016/J.COMNET.2012.11.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KarasabunKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KawaharaTMKI13, author = {Ryoichi Kawahara and Tetsuya Takine and Tatsuya Mori and Noriaki Kamiyama and Keisuke Ishibashi}, title = {Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1560--1576}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.010}, doi = {10.1016/J.COMNET.2013.02.010}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KawaharaTMKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KeH13, author = {Kai{-}Wei Ke and Chia{-}Hui Huang}, title = {Performance evaluation of multisource Application Layer Multicast {(ALM):} Theoretical and simulative aspects}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1408--1424}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.01.002}, doi = {10.1016/J.COMNET.2013.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KeH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KhanK13, author = {Reduan H. Khan and Jamil Y. Khan}, title = {A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {825--845}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.002}, doi = {10.1016/J.COMNET.2012.11.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KhanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KhosroshahyAQ13, author = {Masood Khosroshahy and Mustafa K. Mehmet Ali and Dongyu Qiu}, title = {The {SIC} botnet lifecycle model: {A} step beyond traditional epidemiological models}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {404--421}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.020}, doi = {10.1016/J.COMNET.2012.07.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KhosroshahyAQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KilicG13, author = {Necati Kilic and Vehbi Cagri Gungor}, title = {Analysis of low power wireless links in smart grid environments}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1192--1203}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.009}, doi = {10.1016/J.COMNET.2012.12.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KilicG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KimIF13, author = {Juhoon Kim and Luigi Iannone and Anja Feldmann}, title = {Caching Locator/ID mappings: An experimental scalability analysis and its implications}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {897--909}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.007}, doi = {10.1016/J.COMNET.2012.11.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KimIF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KimKL13, author = {Byung{-}Gook Kim and Jeong{-}Ahn Kwon and Jang{-}Won Lee}, title = {Subchannel allocation for the OFDMA-based femtocell system}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3617--3629}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.008}, doi = {10.1016/J.COMNET.2013.08.008}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KimKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KimY13, author = {Yusung Kim and Ikjun Yeom}, title = {Performance analysis of in-network caching for content-centric networking}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2465--2482}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.026}, doi = {10.1016/J.COMNET.2012.11.026}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KimY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KolbergBDWK13, author = {Mario Kolberg and John F. Buford and Krishna Kishore Dhara and Xiaotao Wu and Venky Krishnaswamy}, title = {Feature interaction in a federated communications-enabled collaboration platform}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2410--2428}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.023}, doi = {10.1016/J.COMNET.2013.02.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KolbergBDWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KothariW13, author = {Kush Kothari and Matthew K. Wright}, title = {Mimic: An active covert channel that evades regularity-based detection}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {647--657}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.008}, doi = {10.1016/J.COMNET.2012.10.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KothariW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KuhlmanKR13, author = {Chris J. Kuhlman and V. S. Anil Kumar and S. S. Ravi}, title = {Controlling opinion propagation in online networks}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2121--2132}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.025}, doi = {10.1016/J.COMNET.2012.11.025}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KuhlmanKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KwonL13, author = {Sungoh Kwon and Neung{-}Hyung Lee}, title = {Cell {ID} extension in femtocell environments}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {1048--1062}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.003}, doi = {10.1016/J.COMNET.2012.12.003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KwonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LagkasSL13, author = {T. D. Lagkas and Panagiotis G. Sarigiannidis and Malamati D. Louta}, title = {On analyzing the intra-frame power saving potentials of the {IEEE} 802.16e downlink vertical mapping}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1656--1673}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.015}, doi = {10.1016/J.COMNET.2013.02.015}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LagkasSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiLLS13, author = {Chengzhe Lai and Hui Li and Rongxing Lu and Xuemin (Sherman) Shen}, title = {{SE-AKA:} {A} secure and efficient group authentication and key agreement protocol for {LTE} networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3492--3510}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.003}, doi = {10.1016/J.COMNET.2013.08.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LaiT13, author = {Wei Kuang Lai and Chang{-}Lung Tang}, title = {QoS-aware downlink packet scheduling for {LTE} networks}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1689--1698}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.017}, doi = {10.1016/J.COMNET.2013.02.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LaiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Las-CasasGAZN13, author = {Pedro Henrique B. Las{-}Casas and Dorgival O. Guedes and Jussara M. Almeida and Artur Ziviani and Humberto T. Marques{-}Neto}, title = {SpaDeS: Detecting spammers at the source network}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {526--539}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.015}, doi = {10.1016/J.COMNET.2012.07.015}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Las-CasasGAZN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeCB13, author = {Jongwook Lee and Jin{-}Ghoo Choi and Saewoong Bahk}, title = {Opportunistic downlink data delivery for mobile collaborative communities}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1644--1655}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.014}, doi = {10.1016/J.COMNET.2013.02.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeCHK13, author = {Jeng{-}Wei Lee and I{-}Hsun Chuang and Win{-}Bin Huang and Yau{-}Hwang Kuo}, title = {An opportunistic resource allocation approach for mixed QoS and non-QoS connections in {OFDMA} wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2615--2627}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.008}, doi = {10.1016/J.COMNET.2013.05.008}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LeeCHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeCHL13, author = {Jiunn{-}Jye Lee and Hann{-}Huei Chiou and Chia{-}Chang Hsu and Chin{-}Laung Lei}, title = {An adaptive sector-based routing model over structured peer-to-peer networks}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {887--896}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.006}, doi = {10.1016/J.COMNET.2012.11.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeJS13, author = {Seung{-}Ho Lee and Han{-}You Jeong and Seung{-}Woo Seo}, title = {Optimal pricing and capacity partitioning for tiered access service in virtual networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3941--3956}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.014}, doi = {10.1016/J.COMNET.2013.09.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeN13, author = {HyunYong Lee and Akihiro Nakao}, title = {User-assisted in-network caching in information-centric networking}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3142--3153}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.008}, doi = {10.1016/J.COMNET.2013.07.008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LeeN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LevaKKL13, author = {Tapio Lev{\"{a}} and Miika Komu and Ari Ker{\"{a}}nen and Sakari Luukkainen}, title = {Adoption barriers of network layer protocols: The case of host identity protocol}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2218--2232}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.024}, doi = {10.1016/J.COMNET.2012.11.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LevaKKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LinLC13, author = {Hui{-}Tang Lin and Ying{-}You Lin and Jui{-}Wei Chiang}, title = {Genetic-based real-time fast-flux service networks detection}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {501--513}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.017}, doi = {10.1016/J.COMNET.2012.07.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LinLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LinLS13, author = {Hui{-}Tang Lin and Ying{-}You Lin and Chung{-}Jui Sun}, title = {Efficient and adaptive resource scheduling in {IEEE} 802.16j transparent relay networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2514--2535}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.012}, doi = {10.1016/J.COMNET.2013.04.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LinLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LinSCL13, author = {Gongqi Lin and Sieteng Soh and Kwan{-}Wu Chin and Mihai M. Lazarescu}, title = {Efficient heuristics for energy-aware routing in networks with bundled links}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1774--1788}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.006}, doi = {10.1016/J.COMNET.2013.03.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LinSCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LinYW13, author = {Peng Lin and Alan Kai{-}Hau Yeung and Angus Kin Yeung Wong}, title = {Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3773--3789}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.006}, doi = {10.1016/J.COMNET.2013.09.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LinYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LingLYFJZ13, author = {Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Weijia Jia and Wei Zhao}, title = {Protocol-level attacks against Tor}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {869--886}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.005}, doi = {10.1016/J.COMNET.2012.11.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LingLYFJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiouL13, author = {Ren{-}Huang Liou and Yi{-}Bing Lin}, title = {Mobility management with the central-based location area policy}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {847--857}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.003}, doi = {10.1016/J.COMNET.2012.11.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiouL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiuLL13, author = {Honghuing Liu and Patrick P. C. Lee and John C. S. Lui}, title = {On the credit evolution of credit-based incentive protocols in wireless mesh networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3327--3343}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.021}, doi = {10.1016/J.COMNET.2013.07.021}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiuLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiuWZKW13, author = {Xiao{-}Yang Liu and Kai{-}Liang Wu and Yanmin Zhu and Linghe Kong and Min{-}You Wu}, title = {Mobility increases the surface coverage of distributed sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2348--2363}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.008}, doi = {10.1016/J.COMNET.2013.04.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiuWZKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LogotaCSN13, author = {Evariste Logota and Carlos Campos and Susana Sargento and Augusto Neto}, title = {Advanced multicast class-based bandwidth over-provisioning}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {2075--2092}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.009}, doi = {10.1016/J.COMNET.2013.04.009}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LogotaCSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LongK13, author = {Long Long and Ahmed E. Kamal}, title = {Protecting multicast services in optical internet backbones}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {17--28}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.019}, doi = {10.1016/J.COMNET.2012.07.019}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LongK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LucasPGH13, author = {Vincent Lucas and Jean{-}Jacques Pansiot and Dominique Grad and Beno{\^{\i}}t Hilt}, title = {Robust and fair Multicast Congestion Control {(M2C)}}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {699--724}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.016}, doi = {10.1016/J.COMNET.2012.10.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LucasPGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LuoYLG13, author = {Xiaoyuan Luo and Yanlin Yan and Shaobao Li and Xinping Guan}, title = {Topology control based on optimally rigid graph in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {1037--1047}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.002}, doi = {10.1016/J.COMNET.2012.12.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LuoYLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MahapatraDGS13, author = {Rajarshi Mahapatra and Antonio De Domenico and Rohit Gupta and Emilio Calvanese Strinati}, title = {Green framework for future heterogeneous wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1518--1528}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.007}, doi = {10.1016/J.COMNET.2013.02.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MahapatraDGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MahmoodiFA13, author = {Toktam Mahmoodi and Vasilis Friderikos and Hamid Aghvami}, title = {Using traffic asymmetry to enhance {TCP} performance}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {317--329}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.015}, doi = {10.1016/J.COMNET.2012.09.015}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MahmoodiFA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MalandrinoS13, author = {Delfina Malandrino and Vittorio Scarano}, title = {Privacy leakage on the Web: Diffusion and countermeasures}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2833--2855}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.013}, doi = {10.1016/J.COMNET.2013.06.013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MalandrinoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ManzanoCTSH13, author = {Marc Manzano and Eusebi Calle and Victor Torres{-}Padrosa and Juan Segovia and David Harle}, title = {Endurance: {A} new robustness measure for complex networks under multiple failure scenarios}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3641--3653}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.011}, doi = {10.1016/J.COMNET.2013.08.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ManzanoCTSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MarsanCCM13, author = {Marco Ajmone Marsan and Luca Chiaraviglio and Delia Ciullo and Michela Meo}, title = {On the effectiveness of single and multiple base station sleep modes in cellular networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3276--3290}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.016}, doi = {10.1016/J.COMNET.2013.07.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MarsanCCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Martinez-JuliaG13, author = {Pedro Martinez{-}Julia and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2280--2300}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.020}, doi = {10.1016/J.COMNET.2012.11.020}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Martinez-JuliaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MaternaghanT13, author = {Claire Maternaghan and Kenneth J. Turner}, title = {Policy conflicts in home automation}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2429--2441}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.026}, doi = {10.1016/J.COMNET.2013.02.026}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MaternaghanT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MatsuiTNS13, author = {Genki Matsui and Takuji Tachibana and Yukinori Nakamura and Kenji Sugimoto}, title = {Distributed power adjustment based on control theory for cognitive radio networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3344--3356}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.022}, doi = {10.1016/J.COMNET.2013.07.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MatsuiTNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MbarushimanaSB13, author = {Consolee Mbarushimana and Ali Shahrabi and Tom Buggy}, title = {A cross-layer {TCP} enhancement in QoS-aware mobile ad hoc networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {286--301}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.013}, doi = {10.1016/J.COMNET.2012.09.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MbarushimanaSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MeerjaHWY13, author = {Khalim Amjad Meerja and Pin{-}Han Ho and Bin Wu and Hsiang{-}Fu Yu}, title = {Media access protocol for a coexisting cognitive femtocell network}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2961--2975}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.017}, doi = {10.1016/J.COMNET.2013.06.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MeerjaHWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MehmoodLDJ13, author = {Tahir Mehmood and Lavy Libman and Hooman Reisi Dehkordi and Sanjay K. Jha}, title = {Optimal opportunistic routing and network coding for bidirectional wireless flows}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {4030--4046}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.10.004}, doi = {10.1016/J.COMNET.2013.10.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MehmoodLDJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MengLK13, author = {Yuxin Meng and Wenjuan Li and Lam{-}for Kwok}, title = {Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3630--3640}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.009}, doi = {10.1016/J.COMNET.2013.08.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MengLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MengTL13, author = {Xiang Meng and Pui{-}Sze Tsang and King{-}Shan Lui}, title = {Analysis of distribution time of multiple files in a {P2P} network}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2900--2915}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.015}, doi = {10.1016/J.COMNET.2013.06.015}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MengTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MiaoYWJC13, author = {Yuting Miao and Qiang Yang and Chunming Wu and Ming Jiang and Jinzhou Chen}, title = {Multicast virtual network mapping for supporting multiple description coding-based video applications}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {990--1002}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.013}, doi = {10.1016/J.COMNET.2012.11.013}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MiaoYWJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MilitanoIS13, author = {Leonardo Militano and Antonio Iera and Francesco Scarcello}, title = {A fair cooperative content-sharing service}, journal = {Comput. Networks}, volume = {57}, number = {9}, pages = {1955--1973}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.014}, doi = {10.1016/J.COMNET.2013.03.014}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MilitanoIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MouttappaMC13, author = {Pramila Mouttappa and Stephane Maag and Ana R. Cavalli}, title = {Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2992--3008}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.019}, doi = {10.1016/J.COMNET.2013.06.019}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MouttappaMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MtibaaH13, author = {Abderrahmen Mtibaa and Khaled A. Harras}, title = {Fairness-related challenges in mobile opportunistic networking}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {228--242}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.019}, doi = {10.1016/J.COMNET.2012.08.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MtibaaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MukherjeeBPD13, author = {Anwesha Mukherjee and Srimoyee Bhattacherjee and Sucheta Pal and Debashis De}, title = {Femtocell based green power consumption methods for mobile network}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {162--178}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.007}, doi = {10.1016/J.COMNET.2012.09.007}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MukherjeeBPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NakamuraIM13, author = {Masahide Nakamura and Kousuke Ikegami and Shinsuke Matsumoto}, title = {Considering impacts and requirements for better understanding of environment interactions in home network services}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2442--2453}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.024}, doi = {10.1016/J.COMNET.2013.02.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NakamuraIM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NamDP13, author = {Seung Yeob Nam and Sirojiddin Djuraev and Minho Park}, title = {Collaborative approach to mitigating {ARP} poisoning-based Man-in-the-Middle attacks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3866--3884}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.011}, doi = {10.1016/J.COMNET.2013.09.011}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/NamDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NamKLK13, author = {Seung Yeob Nam and Seong Joon Kim and Sihyung Lee and Hyong S. Kim}, title = {Estimation of the available bandwidth ratio of a remote link or path segments}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {61--77}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.015}, doi = {10.1016/J.COMNET.2012.08.015}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/NamKLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NaorD13, author = {Zohar Naor and Sajal K. Das}, title = {A scalable framework for mobile real-time group communication services}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3855--3865}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.010}, doi = {10.1016/J.COMNET.2013.09.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NaorD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NewazCLCC13, author = {S. H. Shah Newaz and {\'{A}}ngel Cuevas and Gyu Myoung Lee and No{\"{e}}l Crespi and Jun Kyun Choi}, title = {Adaptive Delay-Aware Energy Efficient {TDM-PON}}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1577--1596}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.001}, doi = {10.1016/J.COMNET.2013.02.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NewazCLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NgSM13, author = {Hai{-}Heng Ng and Wee{-}Seng Soh and Mehul Motani}, title = {An underwater acoustic {MAC} protocol using reverse opportunistic packet appending}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2733--2751}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.007}, doi = {10.1016/J.COMNET.2013.06.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NgSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NguyenYT13, author = {Nam P. Nguyen and Guanhua Yan and My T. Thai}, title = {Analysis of misinformation containment in online social networks}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2133--2146}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.002}, doi = {10.1016/J.COMNET.2013.04.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NguyenYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NooruzzamanKK13, author = {Md. Nooruzzaman and Osanori Koyama and Yutaka Katsuyama}, title = {Congestion removing performance of stackable {ROADM} in {WDM} networks under dynamic traffic}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2364--2373}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.010}, doi = {10.1016/J.COMNET.2013.04.010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/NooruzzamanKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OlivaHGHR13, author = {Antonio de la Oliva and Tito R. Vargas Hern{\'{a}}ndez and Juan Carlos Guerri and Jos{\'{e}} Alberto Hern{\'{a}}ndez and Pedro Reviriego}, title = {Performance analysis of Energy Efficient Ethernet on video streaming servers}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {599--608}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.019}, doi = {10.1016/J.COMNET.2012.09.019}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/OlivaHGHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PapathanasiouDT13, author = {Christos Papathanasiou and Nikos Dimitriou and Leandros Tassiulas}, title = {Dynamic radio resource and interference management for {MIMO-OFDMA} mobile broadband wireless access systems}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {3--16}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.014}, doi = {10.1016/J.COMNET.2012.07.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PapathanasiouDT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Paredes-OlivaBD13, author = {Ignasi Paredes{-}Oliva and Pere Barlet{-}Ros and Xenofontas A. Dimitropoulos}, title = {FaRNet: Fast recognition of high-dimensional patterns from big network traffic data}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3897--3913}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.017}, doi = {10.1016/J.COMNET.2013.09.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Paredes-OlivaBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PerdisciAG13, author = {Roberto Perdisci and Davide Ariu and Giorgio Giacinto}, title = {Scalable fine-grained behavioral clustering of HTTP-based malware}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {487--500}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.022}, doi = {10.1016/J.COMNET.2012.06.022}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PerdisciAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PhamA13, author = {Minh Duc Pham and Syed Mahfuzul Aziz}, title = {Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2949--2960}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.001}, doi = {10.1016/J.COMNET.2013.07.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PhamA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PiresR13, author = {Alexandre Andrade Pires and Jos{\'{e}} Ferreira de Rezende}, title = {Independent links: {A} new approach to increase spatial reuse in wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1880--1893}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.010}, doi = {10.1016/J.COMNET.2013.03.010}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PiresR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/QiuS13, author = {Wanzhi Qiu and Efstratios Skafidas}, title = {Distributed routing for signal detection in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3957--3966}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.019}, doi = {10.1016/J.COMNET.2013.09.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/QiuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RaayatpanahFKK13, author = {Mohammad A. Raayatpanah and H. Salehi Fathabadi and Babak H. Khalaj and Salman Khodayifar}, title = {Minimum cost multiple multicast network coding with quantized rates}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1113--1123}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.017}, doi = {10.1016/J.COMNET.2012.11.017}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RaayatpanahFKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RajiullahLBL13, author = {Mohammad Rajiullah and Reine Lundin and Anna Brunstr{\"{o}}m and Stefan Lindskog}, title = {Performance analysis and improvement of {PR-SCTP} for small messages}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3967--3986}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.018}, doi = {10.1016/J.COMNET.2013.09.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RajiullahLBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RiccardiPPV13, author = {Marco Riccardi and Roberto Di Pietro and Marta Palanques and Jorge Aguila Vila}, title = {Titans' revenge: Detecting Zeus via its own flaws}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {422--435}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.023}, doi = {10.1016/J.COMNET.2012.06.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RiccardiPPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RomanZL13, author = {Rodrigo Roman and Jianying Zhou and Javier L{\'{o}}pez}, title = {On the features and challenges of security and privacy in distributed internet of things}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2266--2279}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.018}, doi = {10.1016/J.COMNET.2012.12.018}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RomanZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RondinoneG13, author = {Michele Rondinone and Javier Goz{\'{a}}lvez}, title = {Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1821--1837}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.019}, doi = {10.1016/J.COMNET.2013.02.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RondinoneG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RossiniRBCT13, author = {Giuseppe Rossini and Dario Rossi and Christophe Betoule and Remi Clavier and Gilles Thou{\'{e}}non}, title = {{FIB} Aplasia through probabilistic routing and autoforwarding}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2802--2816}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.011}, doi = {10.1016/J.COMNET.2013.06.011}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RossiniRBCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RottondiVC13, author = {Cristina Rottondi and Giacomo Verticale and Antonio Capone}, title = {Privacy-preserving smart metering with multiple data Consumers}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1699--1713}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.018}, doi = {10.1016/J.COMNET.2013.02.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RottondiVC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RyooJB13, author = {Sunheui Ryoo and Changhee Joo and Saewoong Bahk}, title = {Location-based spectrum allocation and partitioning scheme for cross-tier interference mitigation in macro-femtocell networks}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2869--2879}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.015}, doi = {10.1016/J.COMNET.2012.11.015}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/RyooJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SalahMD13, author = {Saeed Salah and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, title = {A model-based survey of alert correlation techniques}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1289--1317}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.022}, doi = {10.1016/J.COMNET.2012.10.022}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SalahMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SallesGS13, author = {Ronaldo M. Salles and Guofei Gu and Morton Swimmer}, title = {Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {375--377}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.008}, doi = {10.1016/J.COMNET.2012.08.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SallesGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SalsanoBDMV13, author = {Stefano Salsano and Nicola Blefari{-}Melazzi and Andrea Detti and Giacomo Morabito and Luca Veltri}, title = {Information centric networking over {SDN} and OpenFlow: Architectural aspects and experiments on the {OFELIA} testbed}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3207--3221}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.031}, doi = {10.1016/J.COMNET.2013.07.031}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SalsanoBDMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SardoukMMGR13, author = {Ahmad Sardouk and Majdi Mansouri and Le{\"{\i}}la Merghem{-}Boulahia and Dominique Ga{\"{\i}}ti and Rana Rahim{-}Amoud}, title = {Crisis management using MAS-based wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {29--45}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.010}, doi = {10.1016/J.COMNET.2012.08.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SardoukMMGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SecciLJ13, author = {Stefano Secci and Kunpeng Liu and Bijan Jabbari}, title = {Efficient inter-domain traffic engineering with transit-edge hierarchical routing}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {976--989}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.012}, doi = {10.1016/J.COMNET.2012.11.012}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SecciLJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Sengupta13, author = {Soham Sengupta}, title = {An approach to provide a network layer security model with {QR} code generated with shuffled {GPS} parameters as embedded keys traveling over Internet using existing IPv4 mechanism}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2313--2330}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.003}, doi = {10.1016/J.COMNET.2013.04.003}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Sengupta13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SerranoPMMB13, author = {Pablo Serrano and Paul Patras and Andrea Mannocci and Vincenzo Mancuso and Albert Banchs}, title = {Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {258--272}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.010}, doi = {10.1016/J.COMNET.2012.09.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SerranoPMMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SerrorZB13, author = {J{\'{e}}r{\'{e}}my Serror and Hui Zang and Jean{-}Chrysostome Bolot}, title = {Measurement and modeling of paging channel overloads on a cellular network}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2499--2513}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.011}, doi = {10.1016/J.COMNET.2013.04.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SerrorZB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShanCMQ13, author = {Dong Mei Shan and Kee Chaing Chua and Gurusamy Mohan and Jian Qiu}, title = {Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {46--60}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.016}, doi = {10.1016/J.COMNET.2012.08.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShanCMQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShanLLS13, author = {Feng Shan and Weifa Liang and Jun Luo and Xiaojun Shen}, title = {Network lifetime maximization for time-sensitive data gathering in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1063--1077}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.005}, doi = {10.1016/J.COMNET.2012.12.005}, timestamp = {Fri, 28 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ShanLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShiehYLC13, author = {Ce{-}Kuen Shieh and Chia{-}Yu Yu and Cheng{-}Han Lin and J. Morris Chang}, title = {Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3511--3521}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.004}, doi = {10.1016/J.COMNET.2013.08.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShiehYLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShinXG13, author = {Seungwon Shin and Zhaoyan Xu and Guofei Gu}, title = {{EFFORT:} {A} new host-network cooperated framework for efficient and effective bot malware detection}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2628--2642}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.010}, doi = {10.1016/J.COMNET.2013.05.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShinXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SicariCR13, author = {Sabrina Sicari and Alberto Coen{-}Porisini and Roberto Riggio}, title = {{DARE:} evaluating Data Accuracy using node REputation}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3098--3111}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.014}, doi = {10.1016/J.COMNET.2013.07.014}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SicariCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SilvaCL13, author = {Jo{\~{a}}o Marco C. Silva and Paulo Carvalho and Solange Rito Lima}, title = {A multiadaptive sampling technique for cost-effective network measurements}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3357--3369}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.023}, doi = {10.1016/J.COMNET.2013.07.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SilvaCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SilvaSPS13, author = {S{\'{e}}rgio S. C. Silva and Rodrigo M. P. Silva and Raquel Coelho Gomes Pinto and Ronaldo M. Salles}, title = {Botnets: {A} survey}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {378--403}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.021}, doi = {10.1016/J.COMNET.2012.07.021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SilvaSPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SoodEB13, author = {Aditya K. Sood and Richard J. Enbody and Rohit Bansal}, title = {Dissecting SpyEye - Understanding the design of third generation botnets}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {436--450}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.06.021}, doi = {10.1016/J.COMNET.2012.06.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SoodEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/StojanovicKR13, author = {Mirjana D. Stojanovic and Aleksandra Kostic{-}Ljubisavljevic and Vesna M. Radonjic{-}Djogatovic}, title = {SLA-controlled interconnection charging in next generation networks}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2374--2394}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.013}, doi = {10.1016/J.COMNET.2013.04.013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/StojanovicKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SunGW13, author = {Wen Sun and Yu Ge and Wai{-}Choong Wong}, title = {A lightweight distributed scheme for mitigating inter-user interference in body sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3885--3896}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.013}, doi = {10.1016/J.COMNET.2013.09.013}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SunGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TaggerTKPP13, author = {Ben Tagger and Dirk Trossen and Alexandros Kostopoulos and Stuart Porter and George Parisis}, title = {Realising an application environment for information-centric networking}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3249--3266}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.015}, doi = {10.1016/J.COMNET.2013.08.015}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TaggerTKPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TanC13, author = {Evan Tan and Chun Tung Chou}, title = {Joint optimization of continuity and quality for streaming video}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {609--621}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.001}, doi = {10.1016/J.COMNET.2012.10.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TanC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TarissanQMDPL13, author = {Fabien Tarissan and Bruno Quoitin and Pascal M{\'{e}}rindol and Benoit Donnet and Jean{-}Jacques Pansiot and Matthieu Latapy}, title = {Towards a bipartite graph modeling of the internet topology}, journal = {Comput. Networks}, volume = {57}, number = {11}, pages = {2331--2347}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.04.007}, doi = {10.1016/J.COMNET.2013.04.007}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TarissanQMDPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Torkestani13, author = {Javad Akbari Torkestani}, title = {An energy-efficient topology construction algorithm for wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1714--1725}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.001}, doi = {10.1016/J.COMNET.2013.03.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Torkestani13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Torroglosa-GarciaPML13, author = {Elena Torroglosa{-}Garc{\'{\i}}a and Antonio D. Perez{-}Morales and Pedro Martinez{-}Julia and Diego R. L{\'{o}}pez}, title = {Integration of the OAuth and Web Service family security standards}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2233--2249}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.027}, doi = {10.1016/J.COMNET.2012.11.027}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Torroglosa-GarciaPML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TosiCC13, author = {Stefania Tosi and Sara Casolari and Michele Colajanni}, title = {Data clustering based on correlation analysis applied to highly variable domains}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3025--3038}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.004}, doi = {10.1016/J.COMNET.2013.07.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TosiCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TschorschS13, author = {Florian Tschorsch and Bj{\"{o}}rn Scheuermann}, title = {An algorithm for privacy-preserving distributed user statistics}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2775--2787}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.011}, doi = {10.1016/J.COMNET.2013.05.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TschorschS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TunLYN13, author = {Thein Than Tun and Robin C. Laney and Yijun Yu and Bashar Nuseibeh}, title = {Specifying software features for composition: {A} tool-supported approach}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2454--2464}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.022}, doi = {10.1016/J.COMNET.2013.02.022}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TunLYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TuncerKS13, author = {Hasan Tuncer and Andres Kwasinski and Nirmala Shenoy}, title = {Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2578--2596}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.004}, doi = {10.1016/J.COMNET.2013.05.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TuncerKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TurnerM13, author = {Kenneth J. Turner and Evan H. Magill}, title = {Special Issue on Feature interaction in communications and software systems}, journal = {Comput. Networks}, volume = {57}, number = {12}, pages = {2395--2398}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.006}, doi = {10.1016/J.COMNET.2013.05.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TurnerM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/UnalC13, author = {Devrim Unal and Mehmet Ufuk {\c{C}}aglayan}, title = {A formal role-based access control model for security policies in multi-domain mobile networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {330--350}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.018}, doi = {10.1016/J.COMNET.2012.09.018}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/UnalC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VakiliG13, author = {Ahmad Vakili and Jean{-}Charles Gr{\'{e}}goire}, title = {QoE management for video conferencing applications}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1726--1738}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.03.002}, doi = {10.1016/J.COMNET.2013.03.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VakiliG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VarisMSK13, author = {Nuutti Varis and Jukka Manner and Mikko S{\"{a}}rel{\"{a}} and Timo Kiravuo}, title = {DBridges: Flexible floodless frame forwarding}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3601--3616}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.007}, doi = {10.1016/J.COMNET.2013.08.007}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VarisMSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VieiraAAC13, author = {Alex Borges Vieira and Rafael Barra de Almeida and Jussara Marques de Almeida and S{\'{e}}rgio Vale Aguiar Campos}, title = {SimplyRep: {A} simple and effective reputation system to fight pollution in {P2P} live streaming}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {1019--1036}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.001}, doi = {10.1016/J.COMNET.2012.12.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VieiraAAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VieiraGM13, author = {Luiz Filipe M. Vieira and Mario Gerla and Archan Misra}, title = {Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3267--3275}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.015}, doi = {10.1016/J.COMNET.2013.07.015}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VieiraGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VieiraRBF13, author = {Fabio R. J. Vieira and Jos{\'{e}} Ferreira de Rezende and Valmir Carneiro Barbosa and Serge Fdida}, title = {Local heuristic for the refinement of multi-path routing in wireless mesh networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {273--285}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.009}, doi = {10.1016/J.COMNET.2012.09.009}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/VieiraRBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WahlischSV13, author = {Matthias W{\"{a}}hlisch and Thomas C. Schmidt and Markus Vahlenkamp}, title = {Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3192--3206}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.009}, doi = {10.1016/J.COMNET.2013.07.009}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WahlischSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangGM13, author = {Yu Wang and Hari Krishna Garg and Mehul Motani}, title = {Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {668--681}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.014}, doi = {10.1016/J.COMNET.2012.10.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangIFW13, author = {Yi Wang and Marios Iliofotou and Michalis Faloutsos and Bin Wu}, title = {Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2147--2158}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.028}, doi = {10.1016/J.COMNET.2012.11.028}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangIFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangL13, author = {Wenye Wang and Zhuo Lu}, title = {Cyber security in the Smart Grid: Survey and challenges}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1344--1371}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.017}, doi = {10.1016/J.COMNET.2012.12.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangLYLL13, author = {Xiaoping Wang and Yunhao Liu and Zheng Yang and Kai Lu and Jun Luo}, title = {{OFA:} An optimistic approach to conquer flip ambiguity in network localization}, journal = {Comput. Networks}, volume = {57}, number = {6}, pages = {1529--1544}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.008}, doi = {10.1016/J.COMNET.2013.02.008}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangLYLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangM13, author = {Le Wang and Jukka Manner}, title = {Energy-efficient mobile web in a bundle}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3581--3600}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.006}, doi = {10.1016/J.COMNET.2013.08.006}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangS13, author = {Wei{-}Tong Wang and Kuo{-}Feng Ssu}, title = {Obstacle detection and estimation in wireless sensor networks}, journal = {Comput. Networks}, volume = {57}, number = {4}, pages = {858--868}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.004}, doi = {10.1016/J.COMNET.2012.11.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangWMW13, author = {Ze Wang and Yunlong Wang and Maode Ma and Jigang Wu}, title = {Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2788--2801}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.010}, doi = {10.1016/J.COMNET.2013.06.010}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangWMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WehmuthZ13, author = {Klaus Wehmuth and Artur Ziviani}, title = {{DACCER:} Distributed Assessment of the Closeness CEntrality Ranking in complex networks}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2536--2548}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.001}, doi = {10.1016/J.COMNET.2013.05.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WehmuthZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WuCWL13, author = {Weigang Wu and Jiannong Cao and Hejun Wu and Jingjing Li}, title = {Robust and dynamic data aggregation in wireless sensor networks: {A} cross-layer approach}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3929--3940}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.09.015}, doi = {10.1016/J.COMNET.2013.09.015}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/WuCWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WuH13, author = {Zhenhua Wu and Yu Hen Hu}, title = {How many wireless resources are needed to resolve the hidden terminal problem?}, journal = {Comput. Networks}, volume = {57}, number = {18}, pages = {3987--3996}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.10.001}, doi = {10.1016/J.COMNET.2013.10.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WuH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WuLM13, author = {Weijie Wu and John C. S. Lui and Richard T. B. Ma}, title = {On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation}, journal = {Comput. Networks}, volume = {57}, number = {7}, pages = {1674--1688}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.02.016}, doi = {10.1016/J.COMNET.2013.02.016}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/WuLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XiangSWWY13, author = {Yang Xiang and Xingang Shi and Jianping Wu and Zhiliang Wang and Xia Yin}, title = {Sign what you really care about - Secure {BGP} AS-paths efficiently}, journal = {Comput. Networks}, volume = {57}, number = {10}, pages = {2250--2265}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.11.019}, doi = {10.1016/J.COMNET.2012.11.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XiangSWWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XiangWLC13, author = {Xudong Xiang and Jianxiong Wan and Chuang Lin and Xin Chen}, title = {A dynamic programming approximation for downlink channel allocation in cognitive femtocell networks}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2976--2991}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.018}, doi = {10.1016/J.COMNET.2013.06.018}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XiangWLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XuHWY13, author = {Mingwei Xu and Meijia Hou and Dan Wang and Jiahai Yang}, title = {An efficient critical protection scheme for intra-domain routing using link characteristics}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {117--133}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.006}, doi = {10.1016/J.COMNET.2012.09.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/XuHWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XuSLW13, author = {Mingwei Xu and Yunfei Shang and Dan Li and Xin Wang}, title = {Greening data center networks with throughput-guaranteed power-aware routing}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {2880--2899}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.012}, doi = {10.1016/J.COMNET.2012.12.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XuSLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Yan13, author = {Guanhua Yan}, title = {Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks}, journal = {Comput. Networks}, volume = {57}, number = {2}, pages = {540--555}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.07.016}, doi = {10.1016/J.COMNET.2012.07.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Yan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YangYL13, author = {Shengbo Yang and Chai Kiat Yeo and Bu{-}Sung Lee}, title = {MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems}, journal = {Comput. Networks}, volume = {57}, number = {8}, pages = {1805--1820}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.020}, doi = {10.1016/J.COMNET.2012.12.020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/YangYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YaoBX13, author = {Guang Yao and Jun Bi and Peiyao Xiao}, title = {{VASE:} Filtering {IP} spoofing traffic with agility}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {243--257}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.08.018}, doi = {10.1016/J.COMNET.2012.08.018}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YaoBX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YousafW13, author = {Faqir Zarrar Yousaf and Christian Wietfeld}, title = {Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {762--781}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.019}, doi = {10.1016/J.COMNET.2012.10.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YousafW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Yun13, author = {Ji{-}Hoon Yun}, title = {Performance analysis of {IEEE} 802.11 WLANs with rate adaptation in time-varying fading channels}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1153--1166}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.007}, doi = {10.1016/J.COMNET.2012.12.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Yun13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YunOSPY13, author = {Donggyu Yun and Jungseul Ok and Bongjhin Shin and Soobum Park and Yung Yi}, title = {Embedding of virtual network requests over static wireless multihop networks}, journal = {Comput. Networks}, volume = {57}, number = {5}, pages = {1139--1152}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.12.006}, doi = {10.1016/J.COMNET.2012.12.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YunOSPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangLL13, author = {Guoqiang Zhang and Yang Li and Tao Lin}, title = {Caching in information centric networking: {A} survey}, journal = {Comput. Networks}, volume = {57}, number = {16}, pages = {3128--3141}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.007}, doi = {10.1016/J.COMNET.2013.07.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangXT13, author = {Pengfei Zhang and Gaoxi Xiao and Hwee{-}Pink Tan}, title = {Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors}, journal = {Comput. Networks}, volume = {57}, number = {14}, pages = {2689--2704}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.06.003}, doi = {10.1016/J.COMNET.2013.06.003}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhangXT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouLCC13, author = {Peng Zhou and Xiapu Luo and Ang Chen and Rocky K. C. Chang}, title = {SGor: Trust graph based onion routing}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3522--3544}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.005}, doi = {10.1016/J.COMNET.2013.08.005}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhouLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouZG13, author = {Chao Zhou and Xinggong Zhang and Zongming Guo}, title = {Optimal adaptive channel scheduling for scalable video broadcasting over {MIMO} wireless networks}, journal = {Comput. Networks}, volume = {57}, number = {15}, pages = {3039--3050}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.07.010}, doi = {10.1016/J.COMNET.2013.07.010}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhouZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZubeldiaFP13, author = {Martin Zubeldia and Andr{\'{e}}s Ferragut and Fernando Paganini}, title = {Overcoming performance pitfalls in rate-diverse high speed WLANs}, journal = {Comput. Networks}, volume = {57}, number = {17}, pages = {3673--3685}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.08.013}, doi = {10.1016/J.COMNET.2013.08.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZubeldiaFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.